ISACA Exam Questions

which of the following?

When a user employs a client-side digital certificate to authenticate to a web server through Secure Socket
Layer (SSL), confidentiality is MOST vulnerable to which of the following?

A.
IP spoofing

B.
Man-in-the-middle attack

C.
Repudiation

D.
Trojan

Explanation:

A Trojan is a program that gives the attacker full control over the infected computer, thus allowing the attacker to hijack, copy or alter information after authentication by the user. IP spoofing will not work because IP is not used as an authentication mechanism. Man-in-the-middle attacks are not possible if using SSL with client-side certificates. Repudiation is unlikely because client-side certificates authenticate the user.